Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jZBSswQjhQ.exe

Overview

General Information

Sample name:jZBSswQjhQ.exe
renamed because original name is a hash value
Original sample name:58a4b10369cd855f0427cf1139f0d64a.exe
Analysis ID:1532972
MD5:58a4b10369cd855f0427cf1139f0d64a
SHA1:f03481b84c1351881ba87531f93ce0bc12f7eaa9
SHA256:6397988f8f46b82fd519b0a6bfdfeb35966158304369c5608a92adb75ef700fc
Tags:exeuser-abuse_ch
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Entry point lies outside standard sections
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • jZBSswQjhQ.exe (PID: 1404 cmdline: "C:\Users\user\Desktop\jZBSswQjhQ.exe" MD5: 58A4B10369CD855F0427CF1139F0D64A)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: jZBSswQjhQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: jZBSswQjhQ.exeStatic PE information: certificate valid
Source: Binary string: C:\TenProtect\thunk\output\Release\tpsvc.pdb source: jZBSswQjhQ.exe
Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: jZBSswQjhQ.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: jZBSswQjhQ.exeString found in binary or memory: http://ocsp.thawte.com0
Source: jZBSswQjhQ.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: jZBSswQjhQ.exeString found in binary or memory: http://s.symcd.com06
Source: jZBSswQjhQ.exeString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: jZBSswQjhQ.exeString found in binary or memory: http://s2.symcb.com0
Source: jZBSswQjhQ.exeString found in binary or memory: http://sf.symcb.com/sf.crl0a
Source: jZBSswQjhQ.exeString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: jZBSswQjhQ.exeString found in binary or memory: http://sf.symcd.com0&
Source: jZBSswQjhQ.exeString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: jZBSswQjhQ.exeString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: jZBSswQjhQ.exeString found in binary or memory: http://sv.symcd.com0&
Source: jZBSswQjhQ.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: jZBSswQjhQ.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: jZBSswQjhQ.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: jZBSswQjhQ.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: jZBSswQjhQ.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: jZBSswQjhQ.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: jZBSswQjhQ.exeString found in binary or memory: http://www.symauth.com/cps0(
Source: jZBSswQjhQ.exeString found in binary or memory: http://www.symauth.com/rpa00
Source: jZBSswQjhQ.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: jZBSswQjhQ.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: jZBSswQjhQ.exeString found in binary or memory: https://d.symcb.com/rpa0.
Source: jZBSswQjhQ.exeBinary or memory string: OriginalFilename vs jZBSswQjhQ.exe
Source: jZBSswQjhQ.exe, 00000000.00000000.2110969864.000000000040C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTPSVC.EXE vs jZBSswQjhQ.exe
Source: jZBSswQjhQ.exeBinary or memory string: OriginalFilenameTPSVC.EXE vs jZBSswQjhQ.exe
Source: jZBSswQjhQ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean3.winEXE@1/0@1/0
Source: C:\Users\user\Desktop\jZBSswQjhQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\jZBSswQjhQ.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\jZBSswQjhQ.exeSection loaded: tpsvcbase.dllJump to behavior
Source: jZBSswQjhQ.exeStatic PE information: certificate valid
Source: jZBSswQjhQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\TenProtect\thunk\output\Release\tpsvc.pdb source: jZBSswQjhQ.exe
Source: initial sampleStatic PE information: section where entry point is pointing to: .tp3
Source: jZBSswQjhQ.exeStatic PE information: section name: .tp3
Source: jZBSswQjhQ.exeStatic PE information: section name: .tp3
Source: jZBSswQjhQ.exeStatic PE information: section name: .tp3
Source: jZBSswQjhQ.exeStatic PE information: section name: .tp3
Source: jZBSswQjhQ.exeStatic PE information: section name: .tp3
Source: C:\Users\user\Desktop\jZBSswQjhQ.exeCode function: 0_2_0040ED17 push ss; retf 0_2_00410323
Source: jZBSswQjhQ.exeStatic PE information: section name: .tp3 entropy: 7.869411093870724
Source: jZBSswQjhQ.exeStatic PE information: section name: .tp3 entropy: 7.560376174712344
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Software Packing
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
jZBSswQjhQ.exe0%ReversingLabs
jZBSswQjhQ.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
198.187.3.20.in-addr.arpa1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://www.symauth.com/cps0(0%URL Reputationsafe
http://www.symauth.com/rpa000%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
198.187.3.20.in-addr.arpa
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0jZBSswQjhQ.exefalse
  • URL Reputation: safe
unknown
http://www.symauth.com/cps0(jZBSswQjhQ.exefalse
  • URL Reputation: safe
unknown
http://www.symauth.com/rpa00jZBSswQjhQ.exefalse
  • URL Reputation: safe
unknown
http://ocsp.thawte.com0jZBSswQjhQ.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532972
Start date and time:2024-10-14 08:31:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:jZBSswQjhQ.exe
renamed because original name is a hash value
Original Sample Name:58a4b10369cd855f0427cf1139f0d64a.exe
Detection:CLEAN
Classification:clean3.winEXE@1/0@1/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, cdn.onenote.net, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target jZBSswQjhQ.exe, PID 1404 because there are no executed function
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.387026440776216
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:jZBSswQjhQ.exe
File size:373'648 bytes
MD5:58a4b10369cd855f0427cf1139f0d64a
SHA1:f03481b84c1351881ba87531f93ce0bc12f7eaa9
SHA256:6397988f8f46b82fd519b0a6bfdfeb35966158304369c5608a92adb75ef700fc
SHA512:6bdb4a195f31a972d87b0062a9ff0eaaa095ad0c66ea5a339474ea970cdb645a95906b0309dc87dbede29e068d1a9976404b0fe7102e938cb8c6f65ae1cdbe0c
SSDEEP:3072:9z8EVl4VmCHu+uhUveARZQRMl1WEWX1AU:N8kKVaTARZQRMp
TLSH:4B84EDF2A10094A4F61A027698BCDCF48C782EB9C588654E7FDC7AFF81735112B3659B
File Content Preview:MZ......................@................iqZ............................!..L.!This program cannot be run in DOS mode....$.......z/..>N.T>N.T>N.T76oT'N.T76~T.N.T76hTrN.T76xT=N.T>N.TwN.T76aT<N.T76.T?N.T76zT?N.TRich>N.T........PE..L...{..V.................b.
Icon Hash:0f33cca4f4f6330e
Entrypoint:0x45c0d3
Entrypoint Section:.tp3
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x56DFD77B [Wed Mar 9 07:57:47 2016 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:4a2617be29079c89cfaddec691bc871c
Signature Valid:true
Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 03/02/2016 19:00:00 28/03/2019 19:59:59
Subject Chain
  • CN=Tencent Technology(Shenzhen) Company Limited, OU=\u7814\u53d1\u7ba1\u7406\u90e8, O=Tencent Technology(Shenzhen) Company Limited, L=Shenzhen, S=Guangdong, C=CN
Version:3
Thumbprint MD5:C3644DEB9EC2DCAE0E543057192B0C40
Thumbprint SHA-1:C57B841B09620EA6278E62AF20963FAEC8F9E03D
Thumbprint SHA-256:B20E25527D3929213673D0443AFA395B57A6788AD1D2E88059E87003539B1C05
Serial:52048B9C8A67E28F0CC8CC75813DDC5A
Instruction
call dword ptr [0045C0BBh]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
Programming Language:
  • [C++] VS2008 SP1 build 30729
  • [ASM] VS2008 SP1 build 30729
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [LNK] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x5c08b0x0.tp3
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x0.tp3
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x55e000x5590
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x81200x1c.tp3
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.tp30x10000x61040x3c006dedd740270ae473a4aa99fbefa831f6False0.9871744791666667data7.869411093870724IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.tp30x80000x1af80x1c00de02e33793fedca80a8b18270bf74533False0.2720424107142857data4.680147871893896IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tp30xa0000x18dc0x400fa508a48cb0bfc5b2b0152ddc7c02a0cFalse0.783203125data6.161273828306559IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tp30xc0000x4eac40x4ec00fabccf2f832175bac5c4dee7dce9da22False0.08902219742063493data4.835181715607693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tp30x5b0000x20000x12009a86f0ab25dc4bb7ba5cb297383b3a9dFalse0.8934461805555556data7.560376174712344IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xc5ec0x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.39146341463414636
RT_ICON0xcc540x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.4731182795698925
RT_ICON0xcf3c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5574324324324325
RT_ICON0xd0640xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.47894456289978676
RT_ICON0xdf0c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5482851985559567
RT_ICON0xe7b40x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4067919075144509
RT_ICON0xed1c0x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.04644273160339675
RT_ICON0x50d440x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.29346473029045644
RT_ICON0x532ec0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.35647279549718575
RT_ICON0x543940x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5948581560283688
RT_ICON0x547fc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.14650537634408603
RT_ICON0x54ae40x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.30405405405405406
RT_ICON0x54c0c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.3070362473347548
RT_ICON0x55ab40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.4842057761732852
RT_ICON0x5635c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.3670520231213873
RT_ICON0x568c40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.1087136929460581
RT_ICON0x58e6c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.23170731707317074
RT_ICON0x59f140x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.3599290780141844
RT_MENU0x5a37c0x4adataEnglishUnited States0.8648648648648649
RT_DIALOG0x5a3c80x128dataEnglishUnited States0.6081081081081081
RT_STRING0x5a4f00x34dataEnglishUnited States0.46153846153846156
RT_ACCELERATOR0x5a5240x10dataEnglishUnited States1.25
RT_GROUP_ICON0x5a5340x92dataEnglishUnited States0.6301369863013698
RT_GROUP_ICON0x5a5c80x76dataEnglishUnited States0.6610169491525424
RT_VERSION0x5a6400x328dataEnglishUnited States0.4938118811881188
RT_MANIFEST0x5a9680x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
DLLImport
tpsvcBase.dll
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Oct 14, 2024 08:32:31.624767065 CEST5350307162.159.36.2192.168.2.6
Oct 14, 2024 08:32:32.122836113 CEST6494553192.168.2.61.1.1.1
Oct 14, 2024 08:32:32.130050898 CEST53649451.1.1.1192.168.2.6
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Oct 14, 2024 08:32:32.122836113 CEST192.168.2.61.1.1.10xa395Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Oct 14, 2024 08:32:32.130050898 CEST1.1.1.1192.168.2.60xa395Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

Click to jump to process

Click to jump to process

Target ID:0
Start time:02:31:59
Start date:14/10/2024
Path:C:\Users\user\Desktop\jZBSswQjhQ.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\jZBSswQjhQ.exe"
Imagebase:0x400000
File size:373'648 bytes
MD5 hash:58A4B10369CD855F0427CF1139F0D64A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

No disassembly